I was giving this IP address to hack into by a tutor in a lesson this afternoon ive had a quick look and trying to learn were to start with few of colleges were going to be having ago a crack into the server hide some stuff as surprise for him.

I'm hoping for help from experienced members of HACK THIS SITE Were would you start??

Now the tutor is a security expert they developed some software that meant to be new unbreakable security softwareapparently lot of people have had ago wondering were would you start??

I was giving this IP address to hack into by a tutor in a lesson this afternoon ive had a quick look and trying to learn were to start with few of colleges were going to be having ago a crack into the server hide some stuff as surprise for him.

I'm hoping for help from experienced members of HACK THIS SITE Were would you start??

Now the tutor is a security expert they developed some software that meant to be new unbreakable security softwareapparently lot of people have had ago wondering were would you start??

Starting Nmap 6.01 ( http://nmap.org ) at 2012-09-25 14:09 CDTNSE: Loaded 93 scripts for scanning.NSE: Script Pre-scanning.Initiating Parallel DNS resolution of 1 host. at 14:09Completed Parallel DNS resolution of 1 host. at 14:09, 1.40s elapsedInitiating SYN Stealth Scan at 14:09Scanning 134.219.224.55 [1000 ports]Discovered open port 3389/tcp on 134.219.224.55Discovered open port 1025/tcp on 134.219.224.55Discovered open port 80/tcp on 134.219.224.55Discovered open port 1027/tcp on 134.219.224.55Discovered open port 720/tcp on 134.219.224.55Discovered open port 2288/tcp on 134.219.224.55Discovered open port 27715/tcp on 134.219.224.55Discovered open port 5922/tcp on 134.219.224.55Discovered open port 9415/tcp on 134.219.224.55Discovered open port 1718/tcp on 134.219.224.55Discovered open port 3071/tcp on 134.219.224.55Discovered open port 1060/tcp on 134.219.224.55Discovered open port 1119/tcp on 134.219.224.55Discovered open port 19/tcp on 134.219.224.55Discovered open port 783/tcp on 134.219.224.55Discovered open port 20000/tcp on 134.219.224.55Discovered open port 49153/tcp on 134.219.224.55Discovered open port 2875/tcp on 134.219.224.55Discovered open port 990/tcp on 134.219.224.55Discovered open port 1310/tcp on 134.219.224.55Discovered open port 7921/tcp on 134.219.224.55Discovered open port 280/tcp on 134.219.224.55Discovered open port 1089/tcp on 134.219.224.55Discovered open port 61900/tcp on 134.219.224.55Discovered open port 62078/tcp on 134.219.224.55Discovered open port 3128/tcp on 134.219.224.55Discovered open port 50389/tcp on 134.219.224.55Discovered open port 3/tcp on 134.219.224.55Discovered open port 8654/tcp on 134.219.224.55Discovered open port 49157/tcp on 134.219.224.55Discovered open port 5050/tcp on 134.219.224.55Discovered open port 1875/tcp on 134.219.224.55Discovered open port 99/tcp on 134.219.224.55Discovered open port 981/tcp on 134.219.224.55Discovered open port 5226/tcp on 134.219.224.55Discovered open port 9418/tcp on 134.219.224.55Discovered open port 1580/tcp on 134.219.224.55Discovered open port 2196/tcp on 134.219.224.55Discovered open port 5405/tcp on 134.219.224.55Discovered open port 8400/tcp on 134.219.224.55Discovered open port 1174/tcp on 134.219.224.55Discovered open port 1045/tcp on 134.219.224.55Discovered open port 2190/tcp on 134.219.224.55Discovered open port 1122/tcp on 134.219.224.55Discovered open port 3889/tcp on 134.219.224.55Discovered open port 2009/tcp on 134.219.224.55Discovered open port 49158/tcp on 134.219.224.55Discovered open port 3878/tcp on 134.219.224.55Discovered open port 880/tcp on 134.219.224.55Discovered open port 1021/tcp on 134.219.224.55Discovered open port 9002/tcp on 134.219.224.55Discovered open port 119/tcp on 134.219.224.55Discovered open port 2034/tcp on 134.219.224.55Discovered open port 1023/tcp on 134.219.224.55Discovered open port 16001/tcp on 134.219.224.55Discovered open port 5221/tcp on 134.219.224.55Discovered open port 7103/tcp on 134.219.224.55Discovered open port 1300/tcp on 134.219.224.55Discovered open port 1067/tcp on 134.219.224.55Discovered open port 3476/tcp on 134.219.224.55Discovered open port 9111/tcp on 134.219.224.55Discovered open port 4445/tcp on 134.219.224.55Discovered open port 8200/tcp on 134.219.224.55Discovered open port 1199/tcp on 134.219.224.55Discovered open port 2038/tcp on 134.219.224.55Discovered open port 3390/tcp on 134.219.224.55Discovered open port 6005/tcp on 134.219.224.55Discovered open port 1041/tcp on 134.219.224.55Discovered open port 10621/tcp on 134.219.224.55Discovered open port 3871/tcp on 134.219.224.55Discovered open port 406/tcp on 134.219.224.55Discovered open port 5555/tcp on 134.219.224.55Discovered open port 1334/tcp on 134.219.224.55Discovered open port 687/tcp on 134.219.224.55Discovered open port 24444/tcp on 134.219.224.55Discovered open port 48080/tcp on 134.219.224.55Discovered open port 32785/tcp on 134.219.224.55Discovered open port 2010/tcp on 134.219.224.55Discovered open port 2323/tcp on 134.219.224.55Discovered open port 2006/tcp on 134.219.224.55Discovered open port 1165/tcp on 134.219.224.55Discovered open port 18101/tcp on 134.219.224.55Discovered open port 4000/tcp on 134.219.224.55Discovered open port 19842/tcp on 134.219.224.55Discovered open port 9917/tcp on 134.219.224.55Discovered open port 2000/tcp on 134.219.224.55Discovered open port 32774/tcp on 134.219.224.55Discovered open port 9593/tcp on 134.219.224.55Discovered open port 2301/tcp on 134.219.224.55Discovered open port 30000/tcp on 134.219.224.55Discovered open port 9594/tcp on 134.219.224.55Discovered open port 3703/tcp on 134.219.224.55Discovered open port 545/tcp on 134.219.224.55Discovered open port 5001/tcp on 134.219.224.55Discovered open port 306/tcp on 134.219.224.55Discovered open port 1010/tcp on 134.219.224.55Discovered open port 2161/tcp on 134.219.224.55Discovered open port 2920/tcp on 134.219.224.55Discovered open port 9/tcp on 134.219.224.55Discovered open port 301/tcp on 134.219.224.55Discovered open port 10617/tcp on 134.219.224.55Discovered open port 70/tcp on 134.219.224.55Discovered open port 11110/tcp on 134.219.224.55Discovered open port 1503/tcp on 134.219.224.55Discovered open port 6101/tcp on 134.219.224.55Discovered open port 19283/tcp on 134.219.224.55Discovered open port 8333/tcp on 134.219.224.55Discovered open port 705/tcp on 134.219.224.55Discovered open port 4002/tcp on 134.219.224.55Discovered open port 1148/tcp on 134.219.224.55Discovered open port 5033/tcp on 134.219.224.55Discovered open port 3546/tcp on 134.219.224.55Discovered open port 8899/tcp on 134.219.224.55Discovered open port 1761/tcp on 134.219.224.55Discovered open port 1033/tcp on 134.219.224.55Discovered open port 9944/tcp on 134.219.224.55Discovered open port 3017/tcp on 134.219.224.55Discovered open port 2030/tcp on 134.219.224.55Discovered open port 1500/tcp on 134.219.224.55Discovered open port 1087/tcp on 134.219.224.55Discovered open port 3351/tcp on 134.219.224.55Discovered open port 4125/tcp on 134.219.224.55Discovered open port 1271/tcp on 134.219.224.55Discovered open port 3031/tcp on 134.219.224.55Discovered open port 1031/tcp on 134.219.224.55Discovered open port 1107/tcp on 134.219.224.55Discovered open port 9929/tcp on 134.219.224.55Discovered open port 2043/tcp on 134.219.224.55Discovered open port 32779/tcp on 134.219.224.55Discovered open port 3914/tcp on 134.219.224.55Discovered open port 5815/tcp on 134.219.224.55Discovered open port 12265/tcp on 134.219.224.55Discovered open port 49167/tcp on 134.219.224.55Discovered open port 417/tcp on 134.219.224.55Discovered open port 4242/tcp on 134.219.224.55Discovered open port 8007/tcp on 134.219.224.55Discovered open port 1117/tcp on 134.219.224.55Discovered open port 55055/tcp on 134.219.224.55Discovered open port 555/tcp on 134.219.224.55Discovered open port 1077/tcp on 134.219.224.55Discovered open port 7/tcp on 134.219.224.55Discovered open port 900/tcp on 134.219.224.55Discovered open port 3261/tcp on 134.219.224.55Discovered open port 10004/tcp on 134.219.224.55Discovered open port 54045/tcp on 134.219.224.55Discovered open port 4343/tcp on 134.219.224.55Discovered open port 1434/tcp on 134.219.224.55Discovered open port 5960/tcp on 134.219.224.55Discovered open port 722/tcp on 134.219.224.55Discovered open port 3369/tcp on 134.219.224.55Discovered open port 5431/tcp on 134.219.224.55Discovered open port 4848/tcp on 134.219.224.55Discovered open port 3283/tcp on 134.219.224.55Discovered open port 3527/tcp on 134.219.224.55Discovered open port 7627/tcp on 134.219.224.55Discovered open port 2003/tcp on 134.219.224.55Discovered open port 27353/tcp on 134.219.224.55Discovered open port 7937/tcp on 134.219.224.55Discovered open port 1244/tcp on 134.219.224.55Discovered open port 5911/tcp on 134.219.224.55Discovered open port 7496/tcp on 134.219.224.55Discovered open port 458/tcp on 134.219.224.55Discovered open port 4444/tcp on 134.219.224.55Discovered open port 1594/tcp on 134.219.224.55Discovered open port 146/tcp on 134.219.224.55Discovered open port 4111/tcp on 134.219.224.55Discovered open port 1700/tcp on 134.219.224.55Discovered open port 6792/tcp on 134.219.224.55Discovered open port 3766/tcp on 134.219.224.55Discovered open port 9290/tcp on 134.219.224.55Discovered open port 9080/tcp on 134.219.224.55Discovered open port 2393/tcp on 134.219.224.55Discovered open port 8193/tcp on 134.219.224.55Discovered open port 20005/tcp on 134.219.224.55Discovered open port 5101/tcp on 134.219.224.55Discovered open port 444/tcp on 134.219.224.55Discovered open port 9010/tcp on 134.219.224.55Discovered open port 37/tcp on 134.219.224.55Discovered open port 254/tcp on 134.219.224.55Discovered open port 2041/tcp on 134.219.224.55Discovered open port 1812/tcp on 134.219.224.55Discovered open port 6000/tcp on 134.219.224.55Discovered open port 1287/tcp on 134.219.224.55Discovered open port 34572/tcp on 134.219.224.55Discovered open port 1974/tcp on 134.219.224.55Discovered open port 1102/tcp on 134.219.224.55Discovered open port 6002/tcp on 134.219.224.55Discovered open port 6666/tcp on 134.219.224.55Discovered open port 1080/tcp on 134.219.224.55Discovered open port 1047/tcp on 134.219.224.55Discovered open port 4998/tcp on 134.219.224.55Discovered open port 1043/tcp on 134.219.224.55Discovered open port 8010/tcp on 134.219.224.55Discovered open port 1352/tcp on 134.219.224.55Discovered open port 27352/tcp on 134.219.224.55Discovered open port 10778/tcp on 134.219.224.55Discovered open port 6969/tcp on 134.219.224.55Discovered open port 7100/tcp on 134.219.224.55Discovered open port 1864/tcp on 134.219.224.55Discovered open port 8093/tcp on 134.219.224.55Discovered open port 2638/tcp on 134.219.224.55Discovered open port 9100/tcp on 134.219.224.55Discovered open port 1096/tcp on 134.219.224.55Discovered open port 1035/tcp on 134.219.224.55Discovered open port 18040/tcp on 134.219.224.55Discovered open port 1501/tcp on 134.219.224.55Discovered open port 5414/tcp on 134.219.224.55Discovered open port 5950/tcp on 134.219.224.55Discovered open port 1984/tcp on 134.219.224.55Discovered open port 5952/tcp on 134.219.224.55Discovered open port 8045/tcp on 134.219.224.55Discovered open port 3333/tcp on 134.219.224.55Discovered open port 7676/tcp on 134.219.224.55Discovered open port 3325/tcp on 134.219.224.55Discovered open port 9998/tcp on 134.219.224.55Discovered open port 51103/tcp on 134.219.224.55Discovered open port 1687/tcp on 134.219.224.55Discovered open port 513/tcp on 134.219.224.55Discovered open port 32783/tcp on 134.219.224.55Discovered open port 787/tcp on 134.219.224.55Discovered open port 9091/tcp on 134.219.224.55Discovered open port 4001/tcp on 134.219.224.55Discovered open port 1163/tcp on 134.219.224.55Discovered open port 50500/tcp on 134.219.224.55Discovered open port 8083/tcp on 134.219.224.55Discovered open port 8087/tcp on 134.219.224.55Discovered open port 7004/tcp on 134.219.224.55Discovered open port 6547/tcp on 134.219.224.55Discovered open port 1154/tcp on 134.219.224.55Discovered open port 9878/tcp on 134.219.224.55Discovered open port 1097/tcp on 134.219.224.55Discovered open port 1051/tcp on 134.219.224.55Discovered open port 2811/tcp on 134.219.224.55Discovered open port 1972/tcp on 134.219.224.55Discovered open port 81/tcp on 134.219.224.55Discovered open port 222/tcp on 134.219.224.55Discovered open port 85/tcp on 134.219.224.55Discovered open port 6100/tcp on 134.219.224.55Discovered open port 2100/tcp on 134.219.224.55Discovered open port 9535/tcp on 134.219.224.55Discovered open port 6502/tcp on 134.219.224.55Completed SYN Stealth Scan at 14:09, 8.32s elapsed (1000 total ports)Initiating Service scan at 14:09Scanning 240 services on 134.219.224.55Completed Service scan at 14:09, 10.08s elapsed (241 services on 1 host)Initiating OS detection (try #1) against 134.219.224.55WARNING: RST from 134.219.224.55 port 3 -- is this port really open?WARNING: RST from 134.219.224.55 port 3 -- is this port really open?WARNING: RST from 134.219.224.55 port 3 -- is this port really open?WARNING: RST from 134.219.224.55 port 3 -- is this port really open?WARNING: RST from 134.219.224.55 port 3 -- is this port really open?WARNING: RST from 134.219.224.55 port 3 -- is this port really open?Retrying OS detection (try #2) against 134.219.224.55Initiating Traceroute at 14:09Completed Traceroute at 14:09, 3.15s elapsedInitiating Parallel DNS resolution of 19 hosts. at 14:09Completed Parallel DNS resolution of 19 hosts. at 14:09, 13.13s elapsedNSE: Script scanning 134.219.224.55.Initiating NSE at 14:09Completed NSE at 14:09, 3.54s elapsedNmap scan report for 134.219.224.55Host is up (0.14s latency).Not shown: 682 closed ports, 77 filtered portsPORT STATE SERVICE VERSION3/tcp open compressnet?7/tcp open echo?9/tcp open discard?19/tcp open chargen?37/tcp open time?70/tcp open gopher?80/tcp open http Microsoft IIS httpd 6.0| http-methods: OPTIONS TRACE GET HEAD POST| Potentially risky methods: TRACE|_See http://nmap.org/nsedoc/scripts/http-methods.html|_http-title: Site doesn't have a title (text/html).81/tcp open hosts2-ns?85/tcp open mit-ml-dev?99/tcp open metagram?119/tcp open nntp?146/tcp open iso-tp0?222/tcp open rsh-spx?254/tcp open unknown280/tcp open http-mgmt?301/tcp open unknown306/tcp open unknown406/tcp open imsp?417/tcp open onmux?444/tcp open snpp?458/tcp open appleqtc?513/tcp open login?545/tcp open ekshell?555/tcp open dsf?687/tcp open asipregistry?705/tcp open agentx?720/tcp open unknown722/tcp open unknown783/tcp open spamassassin?787/tcp open qsc?880/tcp open unknown900/tcp open omginitialrefs?981/tcp open unknown990/tcp open ftps?1010/tcp open surf?1021/tcp open exp1?1023/tcp open netvenuechat?1025/tcp open msrpc Microsoft Windows RPC1027/tcp open msrpc Microsoft Windows RPC1031/tcp open iad2?1033/tcp open netinfo?1035/tcp open multidropper?1041/tcp open danf-ak2?1043/tcp open boinc?1045/tcp open fpitp?1047/tcp open neod1?1051/tcp open optima-vnet?1060/tcp open polestar?1067/tcp open instl_boots?1077/tcp open imgames?1080/tcp open socks?1087/tcp open cplscrambler-in?1089/tcp open ff-annunc?1096/tcp open cnrprotocol?1097/tcp open sunclustermgr?1102/tcp open adobeserver-1?1107/tcp open isoipsigport-2?1117/tcp open ardus-mtrns?1119/tcp open bnetgame?1122/tcp open availant-mgr?1148/tcp open elfiq-repl?1154/tcp open resacommunity?1163/tcp open sddp?1165/tcp open qsm-gui?1174/tcp open fnet-remote-ui?1199/tcp open dmidi?1244/tcp open isbconference1?1271/tcp open excw?1287/tcp open routematch?1300/tcp open h323hostcallsc?1310/tcp open husky?1334/tcp open writesrv?1352/tcp open lotusnotes?1434/tcp open ms-sql-m?1500/tcp open vlsi-lm?1501/tcp open sas-3?1503/tcp open imtc-mcs?1580/tcp open tn-tl-r1?1594/tcp open sixtrak?1687/tcp open nsjtp-ctrl?1700/tcp open mps-raft?1718/tcp open h323gatedisc?1761/tcp open landesk-rc?1812/tcp open radius?1864/tcp open paradym-31?1875/tcp open westell-stats?1972/tcp open intersys-cache?1974/tcp open drp?1984/tcp open bigbrother?2000/tcp open cisco-sccp?2003/tcp open finger?2006/tcp open invokator?2009/tcp open news?2010/tcp open search?2030/tcp open device2?2034/tcp open scoremgr?2038/tcp open objectmanager?2041/tcp open interbase?2043/tcp open isis-bcast?2100/tcp open amiganetfs?2161/tcp open apc-agent?2190/tcp open tivoconnect?2196/tcp open unknown2288/tcp open netml?2301/tcp open compaqdiag?2323/tcp open 3d-nfsd?2393/tcp open ms-olap1?2638/tcp open sybase?2811/tcp open gsiftp?2875/tcp open dxmessagebase2?2920/tcp open roboeda?3017/tcp open event_listener?3031/tcp open eppc?3071/tcp open csd-mgmt-port?3128/tcp open squid-http?3261/tcp open winshadow?3283/tcp open netassistant?3325/tcp open active-net?3333/tcp open dec-notes?3351/tcp open btrieve?3369/tcp open satvid-datalnk?3389/tcp open ms-wbt-server Microsoft Terminal Service3390/tcp open dsc?3476/tcp open nppmp?3527/tcp open beserver-msg-q?3546/tcp open unknown3703/tcp open adobeserver-3?3766/tcp open unknown3871/tcp open avocent-adsap?3878/tcp open fotogcad?3889/tcp open dandv-tester?3914/tcp open listcrt-port-2?4000/tcp open remoteanything?4001/tcp open newoak?4002/tcp open mlchat-proxy?4111/tcp open xgrid?4125/tcp open rww?4242/tcp open vrml-multi-use?4343/tcp open unicall?4444/tcp open krb524?4445/tcp open upnotifyp?4848/tcp open appserv-http?4998/tcp open maybe-veritas?5001/tcp open commplex-link?5033/tcp open unknown5050/tcp open mmcc?5101/tcp open admdog?5221/tcp open 3exmp?5226/tcp open hp-status?5405/tcp open pcduo?5414/tcp open statusd?5431/tcp open park-agent?5555/tcp open freeciv?5815/tcp open unknown5911/tcp open cpdlc?5922/tcp open unknown5950/tcp open unknown5952/tcp open unknown5960/tcp open unknown6000/tcp open X11?6002/tcp open X11:2?6005/tcp open X11:5?6100/tcp open synchronet-db?6101/tcp open backupexec?6502/tcp open netop-rc?6547/tcp open powerchuteplus?6666/tcp open irc?|_irc-info: Unable to open connection6792/tcp open unknown6969/tcp open acmsoda?7004/tcp open afs3-kaserver?7100/tcp open font-service?7103/tcp open unknown7496/tcp open unknown7627/tcp open soap-http?7676/tcp open imqbrokerd?7921/tcp open unknown7937/tcp open nsrexecd?8007/tcp open ajp12?8010/tcp open xmpp?8045/tcp open unknown8083/tcp open us-srv?8087/tcp open simplifymedia?8093/tcp open unknown8193/tcp open sophos?8200/tcp open trivnet1?8333/tcp open unknown8400/tcp open cvd?8654/tcp open unknown8899/tcp open ospf-lite?9002/tcp open dynamid?9010/tcp open sdr?9080/tcp open glrpc?9091/tcp open xmltec-xmlmail?9100/tcp open jetdirect?9111/tcp open DragonIDSConsole?9290/tcp open unknown9415/tcp open unknown9418/tcp open git?9535/tcp open man?9593/tcp open cba8?9594/tcp open msgsys?9878/tcp open unknown9917/tcp open unknown9929/tcp open nping-echo?9944/tcp open unknown9998/tcp open distinct32?10004/tcp open emcrmirccd?10617/tcp open unknown10621/tcp open unknown10778/tcp open unknown11110/tcp open unknown12265/tcp open unknown16001/tcp open fmsascon?18040/tcp open unknown18101/tcp open unknown19283/tcp open keysrvr?19842/tcp open unknown20000/tcp open dnp?20005/tcp open btx?24444/tcp open unknown27352/tcp open unknown27353/tcp open unknown27715/tcp open unknown30000/tcp open unknown32774/tcp open sometimes-rpc11?32779/tcp open sometimes-rpc21?32783/tcp open unknown32785/tcp open unknown34572/tcp open unknown48080/tcp open unknown49153/tcp open unknown49157/tcp open unknown49158/tcp open unknown49167/tcp open unknown50389/tcp open unknown50500/tcp open unknown51103/tcp open unknown54045/tcp open unknown55055/tcp open unknown61900/tcp open unknown62078/tcp open iphone-sync?OS fingerprint not ideal because: Host distance (21 network hops) is greater than fiveNo OS matches for hostNetwork Distance: 21 hopsService Info: OS: Windows; CPE: cpe:/o:microsoft:windows

I was giving this IP address to hack into by a tutor in a lesson this afternoon ive had a quick look and trying to learn were to start with few of colleges were going to be having ago a crack into the server hide some stuff as surprise for him.

I'm hoping for help from experienced members of HACK THIS SITE Were would you start??

Now the tutor is a security expert they developed some software that meant to be new unbreakable security softwareapparently lot of people have had ago wondering were would you start??

I feel that this is a bit sketchy... Is there anyway that you could give us proof that you have permission to break into this box? Preferably a picture of written consent from the owner, or an email from said owner.

Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning. -Rick Cook

I was giving this IP address to hack into by a tutor in a lesson this afternoon ive had a quick look and trying to learn were to start with few of colleges were going to be having ago a crack into the server hide some stuff as surprise for him.

I'm hoping for help from experienced members of HACK THIS SITE Were would you start??

Now the tutor is a security expert they developed some software that meant to be new unbreakable security softwareapparently lot of people have had ago wondering were would you start??

I feel that this is a bit sketchy... Is there anyway that you could give us proof that you have permission to break into this box? Preferably a picture of written consent from the owner, or an email from said owner.

centip3de wrote:I feel that this is a bit sketchy... Is there anyway that you could give us proof that you have permission to break into this box? Preferably a picture of written consent from the owner, or an email from said owner.

It Clearly States on the page

This page cannot be changed and defaced - try it.

Since there is no security tool installed other than HDF...Fair play rules:(1) DDoS and taking down the site is NOT the challenge - it is kids' play. (2) You are welcome to take control of the system - please don't change the admin password

You are not the only visitor here....Be fair and let others a chance to experience HDF! Thank you very much!

If you need more prof ill get the tutor to email me when im in lesson 2morrow.

-- Tue Sep 25, 2012 4:43 pm --

Right ive found out the server is running Microsoft-IIS/6.0 surly that got to make this easier then being on a Linux serverive not found any good information on port hacking or exploiting open ports if anyone can point in a starting direction be very grateful thanks

Right ive found out the server is running Microsoft-IIS/6.0 surly that got to make this easier then being on a Linux serverive not found any good information on port hacking or exploiting open ports if anyone can point in a starting direction be very grateful thanks

You can always get a usb flash drive and throw on backtrack 5 with unetbootin.If you don't have a usb, you can also burn the iso to a CD.Fire up Nmap, scan the host, save the scan.Fire up Armitage, import the scan, and then see if that will bring up some exploitable ports that way.

Guys you are forgetting to footprint. Good work on the scans but know your target before you start jumping right in. The absolute very first bit of information is HDF. I'm still researching but I believe it is this and might cause some issues with simple injections: http://www.abatis-hdf.com/product.html

"The quieter you become, the more you are able to hear...""Drink all the booze, hack all the things."

limdis wrote:Guys you are forgetting to footprint. Good work on the scans but know your target before you start jumping right in. The absolute very first bit of information is HDF. I'm still researching but I believe it is this and might cause some issues with simple injections: http://www.abatis-hdf.com/product.html